Hostapd and wpa_supplicant configuration -Failure - Invalid MAC_P - supplicant used different EAP type 47
jackbaker
jackbaker
Mon Nov 17 07:57:46 PST 2008
> Hostapd is on 0.5.x
Which exact version of hostapd are you using?
hostapd-0.5.10
Which version of wpa_supplicant are you using?
wpa_supplicant-0.5.10
-------------------------------------------------------------------------------------------------------------------------------------
I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
---------------------------------------------------
I ran a quick test with the current 0.5.x development branch versions of
hostapd and wpa_supplicant and the configuration files you used for
setting the EAP-PSK parameters worked fine.. Invalid MAC_P sounds like a
mismatch in the shared key used for EAP-PSK.
--------------------------------------------------
I am trying to display the shared keys used by the AP (Hostapd) and the Station (wpa_supplicant).
I an using in the function eap_psk_key_setup (eap_psk_common.c for both hostapd and wpa_supplicant, the code printf("psk : %s : %d\n", key, sizeof (key))
On the side Hostapd, the key is displayed but there is not in hexa and the length is "4"
On the side wpa_supplicant, the key is not displayed.
On Wed, Oct 22, 2008 at 04:09:06PM +0200, jackbaker wrote:
> Hostapd is on 0.5.x
Which exact version of hostapd are you using?
Which version of wpa_supplicant are you using?
> I want to use hostapd and wpa_supplicant to sercure the access to a
> Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
> the Access Point and wa_supplicant in the client laptop.
>
> I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
I ran a quick test with the current 0.5.x development branch versions of
hostapd and wpa_supplicant and the configuration files you used for
setting the EAP-PSK parameters worked fine.. Invalid MAC_P sounds like a
mismatch in the shared key used for EAP-PSK.
--
Jouni Malinen PGP id EFC895FA
> Message du 22/10/08 ? 16h09
> De : "jackbaker" <jackbaker at voila.fr>
> A : hostap at lists.shmoo.com
> Copie ? : jackbaker at voila.fr
> Objet : Hostapd and wpa_supplicant configuration -Failure - Invalid MAC_P - supplicant used different EAP type 47
>
> Hello,
>
> Please, could you help me.
>
> Hostapd is on 0.5.x
>
> I want to use hostapd and wpa_supplicant to sercure the access to a
> Network. I want to use WPA-EAP with EAP-PSK. I have installed hostapd in
> the Access Point and wa_supplicant in the client laptop.
>
> I have got a message "INVALID MAC_P" then a failure on "AP Get decision". At Last "Authenfication failed EAP type 0 (unknown)" and "Supplicant used different EAP type 47"
>
>
> I want to know il my configuration is valid or not.
> If it is valid, what is the problem? Is there a solution.
>
> Thanks.
>
> Jack
>
>
>
>
>
> I used these
> configurations :
>
> * The file .config of the hostapd :
> _________________________________________
> CONFIG_DRIVER_MADWIFI=y
> CFLAG += -I/usr/......#path to madwifi src
> CONFIG_EAP=y
> CONFIG_EAP_PSK=y
> CONFIG_RADIUS_SERVER=y
> _________________________________________
>
> * The file hostapd.conf :
> _________________________________________
>
> interface=ath1
> driver=madwifi
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=0
> dump_file=/tmp/hostapd.dump
> ctrl_interface=/var/run/hostapd
> ctrl_interface_group=0
> ssid=test
> ath_algs=1
> ignore_broadcast_ssid=0
>
> ieee8021x=1
> eapol_key_index_workaround=0
> eap_server=1
>
> wpa_pairwise=TKIP
> own_ip_addr=10.0.0.20
> pa=1
> wpa_key_management=WPA-EAP
>
>
>
>
>
> _________________________________________
>
> * The file hostapd.eap_user.conf :
> _________________________________________
>
>
> "psk user" PSK "unknown"
> "eap_psk_user" PSK 0123456789abcdef0123456789abcdef
> "eap_psk_user at example.com" PSK 0123456789abcdef0123456789abcdef
>
>
>
>
> _________________________________________
>
> * The file madwifi.conf :
> _________________________________________
>
>
>
> interface=ath1
>
>
> bridge=br0
>
>
> driver=madwifi
>
>
> logger_syslog=-1
> logger_syslog_level=2
> logger_stdout=-1
> logger_stdout_level=2
> debug=0
>
> dump_file=/tmp/hostapd.dump
>
>
> ssid=wpa-test
>
>
> eap_server=0
> own_ip_addr=127.0.0.1
>
>
>
>
> _________________________________________
>
> * The file .config of the wpa_supplicant :
> _________________________________________
> CONFIG_DRIVER_MADWIFI=y
> CFLAG += -I/usr/......#path to madwifi src
> CONFIG_IEEE8021X_EAPOL=y
> CONFIG_EAP_PSK=y
> CONFIG_CTRL_IFACE=y
> CONFIG_BACKEND=file
> CONFIG_PEERKEY=y
> _________________________________________
>
> * The file wpa_supplicant.conf of the :
> _________________________________________
>
> ctrl_interface=/var/run/wpa_supplicant
> eapol_version=1
> ap_scan=1
> fast_reauth=1
>
> network={
> ssid="test"
> key_mgmt=WPA-EAP
> eap=PSK
> identity="eap_psk_user"
> eappsk=0123456789abcdef0123456789abcdef
> nai="eap_psk_user at example.com"
> }
>
>
> _________________________________________
>
> When running hostapd, this message is shown (access point) :
>
> _________________________________________
> ...
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
> ...
> could not connect to kernel driver.
> ....
> l2_packet_receive - recvfrom: Network is down
> _________________________________________
>
> And when running the wpa_supplicant, the hostapd show :
> _________________________________________
>
> IEEE 802.1X: 4 bytes from 00:20:a6:61:07:50
>
> IEEE 802.1X: version=1 type=1 length=0
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAPOL-Start from STA
>
> ath1: STA 00:20:a6:61:07:50 WPA: event 5 notification
>
> WPA: 00:20:a6:61:07:50 WPA_PTK entering state AUTHENTICATION2
>
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state ABORTING
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state INITIALIZE
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: aborting authentication
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state RESTART
>
> IEEE 802.1X: Integrated EAP server in use - do not generate EAP-Request/Identity
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> EAP: EAP entering state INITIALIZE
>
> EAP: EAP entering state SELECT_ACTION
>
> EAP: getDecision: no identity known yet -> CONTINUE
>
> EAP: EAP entering state PROPOSE_METHOD
>
> EAP: getNextMethod: vendor 0 type 1
>
> EAP: EAP entering state METHOD_REQUEST
>
> EAP: building EAP-Request: Identifier 236
>
> EAP: EAP entering state SEND_REQUEST
>
> EAP: eapReqData -> EAPOL - hexdump(len=5): 01 ec 00 05 01
>
> EAP: EAP entering state IDLE
>
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state CONNECTING
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state AUTHENTICATING
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
>
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 236)
>
> TX EAPOL - hexdump(len=23): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 05 01 ec 00 05 01
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 21 bytes from 00:20:a6:61:07:50
>
> IEEE 802.1X: version=1 type=0 length=17
>
> EAP: code=2 identifier=236 length=17 (response)
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=236 len=17) from STA: EAP Response-Identity (1)
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: STA identity 'eap_psk_user'
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
>
> EAP: EAP-Response received - hexdump(len=17): 02 ec 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> EAP: EAP entering state RECEIVED
>
> EAP: parseEapResp: rxResp=1 respId=236 respMethod=1 respVendor=0 respVendorMethod=0
>
> EAP: EAP entering state INTEGRITY_CHECK
>
> EAP: EAP entering state METHOD_RESPONSE
>
> EAP-Identity: Peer identity - hexdump_ascii(len=12):
>
> 65 61 70 5f 70 73 6b 5f 75 73 65 72 eap_psk_user
>
> EAP: EAP entering state SELECT_ACTION
>
> EAP: getDecision: another method available -> CONTINUE
>
> EAP: EAP entering state PROPOSE_METHOD
>
> EAP: getNextMethod: vendor 0 type 47
>
> EAP: EAP entering state METHOD_REQUEST
>
> EAP: building EAP-Request: Identifier 237
>
> EAP-PSK: PSK-1 (sending)
>
> EAP-PSK: RAND_S (server rand) - hexdump(len=16): 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7
>
> EAP: EAP entering state SEND_REQUEST
>
> EAP: eapReqData -> EAPOL - hexdump(len=29): 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
>
> EAP: EAP entering state IDLE
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state REQUEST
>
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
>
> TX EAPOL - hexdump(len=47): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 1d 01 ed 00 1d 2f 00 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 68 6f 73 74 61 70 64
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 82 bytes from 00:20:a6:61:07:50
>
> IEEE 802.1X: version=1 type=0 length=78
>
> EAP: code=2 identifier=237 length=78 (response)
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: received EAP packet (code=2 id=237 len=78) from STA: EAP Response-PSK (47)
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state RESPONSE
>
> EAP: EAP-Response received - hexdump(len=78): 02 ed 00 4e 2f 40 86 62 5a 58 d3 82 f7 2d 60 22 2e 7f cf d7 83 c7 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> EAP: EAP entering state RECEIVED
>
> EAP: parseEapResp: rxResp=1 respId=237 respMethod=47 respVendor=0 respVendorMethod=0
>
> EAP: EAP entering state INTEGRITY_CHECK
>
> EAP-PSK: received frame: T=1
>
> EAP: EAP entering state METHOD_RESPONSE
>
> EAP-PSK: Received PSK-2
>
> EAP-PSK: ID_P - hexdump_ascii(len=24):
>
> 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 eap_psk_user at exa
>
> 6d 70 6c 65 2e 63 6f 6d mple.com
>
> psk : ?d??g??] : 17
>
> EAP-PSK: AK - hexdump(len=16): [REMOVED]
>
> EAP-PSK: KDK - hexdump(len=16): [REMOVED]
>
> EAP-PSK: RAND_P (client rand) - hexdump(len=16): 2e 27 75 67 bc e6 a6 46 33 7c 7f 5d 92 60 0d a8
>
> EAP-PSK: MAC_P - hexdump(len=16): 0c cf 37 eb bc ce 7b 72 37 21 55 65 95 86 1a 66
>
> EAP-PSK: Invalid MAC_P
>
> EAP-PSK: Expected MAC_P - hexdump(len=16): fb 91 91 fb 90 4b f1 23 aa 16 86 2a e8 a5 48 15
>
> EAP: EAP entering state SELECT_ACTION
>
> EAP: getDecision: method failed -> FAILURE
>
> EAP: EAP entering state FAILURE
>
> EAP: Building EAP-Failure (id=237)
>
> EAP: eapReqData -> EAPOL - hexdump(len=4): 04 ed 00 04
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state FAIL
>
> IEEE 802.1X: Sending EAP Packet to 00:20:a6:61:07:50 (identifier 237)
>
> TX EAPOL - hexdump(len=22): 00 20 a6 61 07 50 00 20 a6 61 1c da 88 8e 01 00 00 04 04 ed 00 04
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 AUTH_PAE entering state HELD
>
> madwifi_set_sta_authorized: addr=00:20:a6:61:07:50 authorized=0
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: unauthorizing port
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: authentication failed - EAP type: 0 (Unknown)
>
> ath1: STA 00:20:a6:61:07:50 IEEE 802.1X: Supplicant used different EAP type: 47 (PSK)
>
> IEEE 802.1X: 00:20:a6:61:07:50 BE_AUTH entering state IDLE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> IEEE 802.1X: 00:20:a6:61:07:50 REAUTH_TIMER entering state INITIALIZE
>
> Signal 2 received - terminating
>
> ath1: STA 00:20:a6:61:07:50 MLME: MLME-DEAUTHENTICATE.indication(00:20:a6:61:07:50, 1)
>
> ath1: STA 00:20:a6:61:07:50 MLME: MLME-DELETEKEYS.request(00:20:a6:61:07:50)
>
> madwifi_del_key: addr=00:20:a6:61:07:50 key_idx=0
>
> Removing station 00:20:a6:61:07:50
>
> EAP: State machine removed
>
> Flushing old station entries
>
> madwifi_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
>
> Deauthenticate all stations
>
> madwifi_set_privacy: enabled=0
>
> madwifi_set_ieee8021x: enabled=0
>
> madwifi_set_iface_flags: dev_up=0
>
> _________________________________________
>
>
>
> the supplicant show :
>
> _________________________________________
>
>
>
> Selecting BSS from priority group 0
> Try to find WPA-enabled AP
>
> 0: 00:20:a6:61:1c:da ssid='test' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
>
> selected based on WPA IE
>
> selected WPA AP 00:20:a6:61:1c:da ssid='test'
>
> Try to find non-WPA AP
>
> Trying to associate with 00:20:a6:61:1c:da (SSID='test' freq=2417 MHz)
>
> Cancelling scan request
>
> WPA: clearing own WPA/RSN IE
>
> Automatic auth_alg selection: 0x1
>
> WPA: using IEEE 802.11i/D3.0
>
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1
>
> WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
>
> WPA: clearing AP RSN IE
>
> WPA: using GTK TKIP
>
> WPA: using PTK TKIP
>
> WPA: using KEY_MGMT 802.1X
>
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
>
> No keys have been configured - skip key clearing
>
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
>
> State: SCANNING -> ASSOCIATING
>
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>
> WEXT: Operstate: linkmode=-1, operstate=5
>
> wpa_driver_madwifi_associate
>
> ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument
>
> wpa_driver_madwifi_associate: SETMLME[ASSOC] failed
>
> Association request to the driver failed
>
> Setting authentication timeout: 5 sec 0 usec
>
> EAPOL: External notification - portControl=Auto
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>
> Wireless event: cmd=0x8b1a len=12
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>
> Wireless event: cmd=0x8b15 len=20
>
> Wireless event: new AP: 00:20:a6:61:1c:da
>
> State: ASSOCIATING -> ASSOCIATED
>
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>
> WEXT: Operstate: linkmode=-1, operstate=5
>
> Associated to a new BSS: BSSID=00:20:a6:61:1c:da
>
> No keys have been configured - skip key clearing
>
> Associated with 00:20:a6:61:1c:da
>
> WPA: Association event - clear replay counter
>
> EAPOL: External notification - portEnabled=0
>
> EAPOL: External notification - portValid=0
>
> EAPOL: External notification - portEnabled=1
>
> EAPOL: SUPP_PAE entering state CONNECTING
>
> EAPOL: SUPP_BE entering state IDLE
>
> EAP: EAP entering state INITIALIZE
>
> EAP: EAP entering state IDLE
>
> Setting authentication timeout: 10 sec 0 usec
>
> Cancelling scan request
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
>
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
>
> RX EAPOL from 00:20:a6:61:1c:da
>
> RX EAPOL - hexdump(len=9): 01 00 00 05 01 67 00 05 01
>
> Setting authentication timeout: 70 sec 0 usec
>
> EAPOL: Received EAP-Packet frame
>
> EAPOL: SUPP_PAE entering state RESTART
>
> EAP: EAP entering state INITIALIZE
>
> EAP: EAP entering state IDLE
>
> EAPOL: SUPP_PAE entering state AUTHENTICATING
>
> EAPOL: SUPP_BE entering state REQUEST
>
> EAPOL: getSuppRsp
>
> EAP: EAP entering state RECEIVED
>
> EAP: Received EAP-Request id=103 method=1 vendor=0 vendorMethod=0
>
> EAP: EAP entering state IDENTITY
>
> CTRL-EVENT-EAP-STARTED EAP authentication started
>
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
>
> EAP: using real identity - hexdump_ascii(len=12):
>
> 65 61 70 5f 70 73 6b 5f 75 73 65 72 eap_psk_user
>
> EAP: EAP entering state SEND_RESPONSE
>
> EAP: EAP entering state IDLE
>
> EAPOL: SUPP_BE entering state RESPONSE
>
> EAPOL: txSuppRsp
>
> TX EAPOL: dst=00:20:a6:61:1c:da
>
> TX EAPOL - hexdump(len=21): 01 00 00 11 02 67 00 11 01 65 61 70 5f 70 73 6b 5f 75 73 65 72
>
> EAPOL: SUPP_BE entering state RECEIVE
>
> RX EAPOL from 00:20:a6:61:1c:da
>
> RX EAPOL - hexdump(len=33): 01 00 00 1d 01 68 00 1d 2f 00 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 68 6f 73 74 61 70 64
>
> EAPOL: Received EAP-Packet frame
>
> EAPOL: SUPP_BE entering state REQUEST
>
> EAPOL: getSuppRsp
>
> EAP: EAP entering state RECEIVED
>
> EAP: Received EAP-Request id=104 method=47 vendor=0 vendorMethod=0
>
> EAP: EAP entering state GET_METHOD
>
> EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)
>
> EAP-PSK: AK - hexdump(len=16): [REMOVED]
>
> EAP-PSK: KDK - hexdump(len=16): [REMOVED]
>
> CTRL-EVENT-EAP-METHOD EAP vendor 0 method 47 (PSK) selected
>
> EAP: EAP entering state METHOD
>
> EAP-PSK: in INIT state
>
> EAP-PSK: Flags=0x0
>
> EAP-PSK: RAND_S - hexdump(len=16): a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4
>
> EAP-PSK: ID_S - hexdump_ascii(len=7):
>
> 68 6f 73 74 61 70 64 hostapd
>
> EAP-PSK: RAND_P - hexdump(len=16): 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac
>
> EAP-PSK: MAC_P - hexdump(len=16): 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25
>
> EAP-PSK: ID_P - hexdump_ascii(len=24):
>
> 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 eap_psk_user at exa
>
> 6d 70 6c 65 2e 63 6f 6d mple.com
>
> EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
>
> EAP: EAP entering state SEND_RESPONSE
>
> EAP: EAP entering state IDLE
>
> EAPOL: SUPP_BE entering state RESPONSE
>
> EAPOL: txSuppRsp
>
> TX EAPOL: dst=00:20:a6:61:1c:da
>
> TX EAPOL - hexdump(len=82): 01 00 00 4e 02 68 00 4e 2f 40 a1 26 9c ef 40 5a 28 e2 f6 7e be 07 53 b8 1b d4 82 30 2c ac 92 fd 19 6d 98 6f 14 fd 7a bd 85 ac 27 21 18 a6 e8 c6 c0 25 b1 c7 98 09 11 40 37 25 65 61 70 5f 70 73 6b 5f 75 73 65 72 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
>
> EAPOL: SUPP_BE entering state RECEIVE
>
> RX EAPOL from 00:20:a6:61:1c:da
>
> RX EAPOL - hexdump(len=8): 01 00 00 04 04 68 00 04
>
> EAPOL: Received EAP-Packet frame
>
> EAPOL: SUPP_BE entering state REQUEST
>
> EAPOL: getSuppRsp
>
> EAP: EAP entering state RECEIVED
>
> EAP: Received EAP-Failure
>
> EAP: EAP entering state FAILURE
>
> CTRL-EVENT-EAP-FAILURE EAP authentication failed
>
> EAPOL: SUPP_PAE entering state HELD
>
> EAPOL: SUPP_BE entering state RECEIVE
>
> EAPOL: SUPP_BE entering state FAIL
>
> EAPOL: SUPP_BE entering state IDLE
>
> EAPOL: startWhen --> 0
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>
> Wireless event: cmd=0x8b15 len=20
>
> Wireless event: new AP: 00:00:00:00:00:00
>
> Setting scan request: 0 sec 100000 usec
>
> Added BSSID 00:20:a6:61:1c:da into blacklist
>
> CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
>
> wpa_driver_madwifi_del_key: keyidx=0
>
> wpa_driver_madwifi_del_key: keyidx=1
>
> wpa_driver_madwifi_del_key: keyidx=2
>
> wpa_driver_madwifi_del_key: keyidx=3
>
> wpa_driver_madwifi_del_key: keyidx=0
>
> State: ASSOCIATED -> DISCONNECTED
>
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>
> WEXT: Operstate: linkmode=-1, operstate=5
>
> EAPOL: External notification - portEnabled=0
>
> EAPOL: SUPP_PAE entering state DISCONNECTED
>
> EAPOL: SUPP_BE entering state INITIALIZE
>
> EAP: EAP entering state DISABLED
>
> EAPOL: External notification - portValid=0
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath1' added
>
> State: DISCONNECTED -> SCANNING
>
> Starting AP scan (broadcast SSID)
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>
> Wireless event: cmd=0x8b1a len=8
>
> CTRL-EVENT-TERMINATING - signal 2 received
>
> Removing interface ath1
>
> State: SCANNING -> DISCONNECTED
>
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>
> WEXT: Operstate: linkmode=-1, operstate=5
>
> No keys have been configured - skip key clearing
>
> EAPOL: External notification - portEnabled=0
>
> EAPOL: External notification - portValid=0
>
> wpa_driver_madwifi_set_drop_unencrypted: enabled=0
>
> wpa_driver_madwifi_set_countermeasures: enabled=0
>
> No keys have been configured - skip key clearing
>
> EAP: deinitialize previously used EAP method (47, PSK) at EAP deinit
>
> Removed BSSID 00:20:a6:61:1c:da from blacklist (clear)
>
>
> _________________________________________
>
>
>
> Thanks Again
>
>
>
>
>
> ____________________________________________________
>
> Voila vous offre 1 Go d?espace pour stocker et partager photos, vid?os, mp3 et autres documents ! http://www.voila.fr/Macle/
>
____________________________________________________
1 Go d?espace pour stocker et partager photos, vid?os, mp3 et autres documents sur Ma Cl? Voila ! http://macle.voila.fr
More information about the Hostap
mailing list